Sandbox and Security
Savfox provides multi-layered sandboxing to control what the AI agent can do on your system. This ensures safe execution of agent-generated commands and file operations.
Sandbox Modes
Set the sandbox mode with --sandbox:
Approval Policies
Control when the agent asks for your approval before executing actions:
Convenience Modes
Full Auto
Combines a relaxed approval policy with workspace-write sandboxing:
Equivalent to --ask-for-approval on-request --sandbox workspace-write.
Bypass Mode (Dangerous)
Skips all confirmations and sandboxing. Use only in trusted, isolated environments:
This flag is intentionally named to remind you of the risk.
Platform-Specific Sandboxing
Savfox supports native OS sandbox mechanisms for stronger isolation:
macOS — Seatbelt
Uses Apple's sandbox-exec to enforce sandboxing at the OS level:
Linux — Landlock + seccomp
Uses Linux kernel security modules for fine-grained access control:
Windows — Restricted Token
Uses Windows restricted tokens to limit process privileges:
Additional Writable Directories
When using workspace-write mode, you can grant write access to additional directories:
Best Practices
-
Default to
workspace-write— It prevents accidental modifications outside your project while allowing the agent to work effectively. -
Use
read-onlyfor analysis — When you only need the agent to read and explain code, use read-only mode for maximum safety. -
Combine
neverapproval with sandbox — If you want hands-free execution, pair--ask-for-approval neverwith a restrictive sandbox mode rather than using--yolo. -
Use platform sandbox for untrusted tasks — The
sandboxsubcommand provides OS-level isolation that is stronger than the built-in policy checks. -
Review approvals in gateway mode — When running the gateway server, use
savfox gateway approvals listto review pending approvals from remote clients.